Advertisement

Selected Areas in Cryptography

15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers

  • Roberto Maria Avanzi
  • Liam Keliher
  • Francesco Sica

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5381)

Table of contents

  1. Front Matter
  2. Elliptic and Hyperelliptic Curve Arithmetic

    1. Peter Birkner, Nicolas Thériault
      Pages 1-17
    2. Philipp Grabher, Johann Großschädl, Dan Page
      Pages 35-50
  3. Block Ciphers I

    1. Jonathan Etrog, Matt J. B. Robshaw
      Pages 51-65
    2. Jacques Patarin, Yannick Seurin
      Pages 66-81
  4. First Invited Talk

    1. Joseph H. Silverman
      Pages 82-102
  5. Hash Functions I

    1. Kazumaro Aoki, Yu Sasaki
      Pages 103-119
    2. Jean-Philippe Aumasson, Willi Meier, Florian Mendel
      Pages 120-135
    3. Pierre-Alain Fouque, Jacques Stern, Sébastien Zimmer
      Pages 136-150
  6. Mathematical Aspects of Applied Cryptography I

  7. Stream Ciphers Cryptanalysis

  8. Hash Functions II

    1. Elena Andreeva, Bart Preneel
      Pages 228-244
    2. Charles Bouillaguet, Pierre-Alain Fouque
      Pages 245-261
    3. Shoichi Hirose, Hidenori Kuwakado
      Pages 262-275
    4. Sebastiaan Indesteege, Florian Mendel, Bart Preneel, Christian Rechberger
      Pages 276-293
  9. Cryptography with Algebraic Curves

  10. Second Invited Talk – Stafford Tavares Lecture

    1. Jacques Patarin
      Pages 328-345
  11. Mathematical Aspects of Applied Cryptography II

  12. Curve-Based Primitives in Hardware

    1. Junfeng Fan, Lejla Batina, Ingrid Verbauwhede
      Pages 387-400
    2. Daniel Hein, Johannes Wolkerstorfer, Norbert Felber
      Pages 401-413
  13. Block Ciphers II

    1. Wil Michiels, Paul Gorissen, Henk D. L. Hollmann
      Pages 414-428
    2. Meiqin Wang, Xiaoyun Wang, Changhui Hu
      Pages 429-441
    3. Wenling Wu, Lei Zhang, Wentao Zhang
      Pages 442-456
  14. Back Matter

About these proceedings

Keywords

CAST-128 CAST-256 Error-correcting Code HAVAL HC-256 MD5 RFID SHA-256 SMS5 chinese remainder complexity cryptographic pairings cryptography elliptic curve side channel analysis

Editors and affiliations

  • Roberto Maria Avanzi
    • 1
  • Liam Keliher
    • 2
  • Francesco Sica
    • 3
  1. 1.Faculty of Mathematics and Horst Görtz Institute for IT-SecurityRuhr University BochumGermany
  2. 2.Department of Mathematics and Computer ScienceMount Allison UniversitySackvilleCanada
  3. 3.Department of Mathematics and Computer ScienceMount Allison University – AceCryptSackvilleCanada

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-04159-4
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-04158-7
  • Online ISBN 978-3-642-04159-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site